Work Role Description: Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.
Work Role Description: Administers databases and/or data management systems that allow for the secure storage, query, protection, and utilization of data.
Work Role Description: Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
Work Role Description: Plans, implements, and operates network services/systems, to include hardware and virtual environments.
Work Role Description: Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components (i.e., Master Incident Management Plan, when applicable).
Work Role Description: Responsible for the cybersecurity of a program, organization, system, or enclave.
Work Role Description: Individual who manages the Communications Security (COMSEC) resources of an organization (CNSSI 4009) or key custodian for a Crypto Key Management System (CKMS).
Work Role Description: Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
Work Role Description: Develops and conducts training or education of personnel within cyber domain.
Work Role Description: Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Work Role Description: Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Work Role Description: Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Work Role Description: Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.
Work Role Description: Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37).
Work Role Description: Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.
Work Role Description: Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.
Work Role Description: Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.
Work Role Description: Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.